[go: up one dir, main page]

CN107018121B - User identity authentication method and device - Google Patents

User identity authentication method and device Download PDF

Info

Publication number
CN107018121B
CN107018121B CN201610895118.4A CN201610895118A CN107018121B CN 107018121 B CN107018121 B CN 107018121B CN 201610895118 A CN201610895118 A CN 201610895118A CN 107018121 B CN107018121 B CN 107018121B
Authority
CN
China
Prior art keywords
user
interactive behavior
virtual reality
preset
reality terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610895118.4A
Other languages
Chinese (zh)
Other versions
CN107018121A (en
Inventor
吴军
曾晓东
尹欢密
林锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Priority to CN201610895118.4A priority Critical patent/CN107018121B/en
Publication of CN107018121A publication Critical patent/CN107018121A/en
Priority to TW106126424A priority patent/TWI668588B/en
Priority to US15/782,747 priority patent/US10437973B2/en
Priority to PCT/US2017/056616 priority patent/WO2018071833A1/en
Priority to MYPI2019002056A priority patent/MY200878A/en
Priority to SG11201903276VA priority patent/SG11201903276VA/en
Priority to JP2019520445A priority patent/JP6692560B2/en
Priority to EP17859671.4A priority patent/EP3526718B1/en
Priority to KR1020197013345A priority patent/KR102151897B1/en
Priority to PH12019500807A priority patent/PH12019500807A1/en
Priority to US16/593,758 priority patent/US10915619B2/en
Application granted granted Critical
Publication of CN107018121B publication Critical patent/CN107018121B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G02OPTICS
    • G02BOPTICAL ELEMENTS, SYSTEMS OR APPARATUS
    • G02B27/00Optical systems or apparatus not provided for by any of the groups G02B1/00 - G02B26/00, G02B30/00
    • G02B27/01Head-up displays
    • G02B27/017Head mounted
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/011Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/011Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
    • G06F3/012Head tracking input arrangements
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/011Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
    • G06F3/013Eye tracking input arrangements
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/017Gesture based interaction, e.g. based on a set of recognized hand gestures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/68Gesture-dependent or behaviour-dependent

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Social Psychology (AREA)
  • Computing Systems (AREA)
  • Biomedical Technology (AREA)
  • Optics & Photonics (AREA)
  • Bioethics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Animal Behavior & Ethology (AREA)
  • User Interface Of Digital Computer (AREA)
  • Collating Specific Patterns (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a method for user identity authentication, which is applied to a virtual reality terminal and comprises the following steps: responding to an execution instruction aiming at a target task needing to be subjected to identity verification, and acquiring interactive behavior characteristics of a user wearing the virtual reality terminal through preset sensing hardware; matching the collected interactive behavior characteristics with interactive behavior characteristics preset by a legal user of the virtual reality terminal; and if the acquired interactive behavior characteristics are matched with the preset interactive behavior characteristics, determining that the identity of the user wearing the virtual reality terminal is legal, and executing the target task. The method and the device can guarantee privacy and safety of the user when the user uses the VR terminal.

Description

User identity authentication method and device
Technical Field
The present application relates to the field of computer applications, and in particular, to a method and an apparatus for user authentication.
Background
VR (Virtual Reality) technology is a technology for generating an interactive three-dimensional interactive environment on a computer by comprehensively using a computer graphics system and various control interfaces, and providing a user with an immersion feeling. With the progress of VR technology and hardware, application scenarios of VR technology are becoming more abundant, and applications of VR terminals are becoming more and more popular.
However, as the use of VR terminals has become widespread, more and more users start using VR terminals, and one problem that is faced is if privacy and security of users when using VR terminals are secured.
Disclosure of Invention
The application provides a user identity authentication method, which is applied to a virtual reality terminal and comprises the following steps:
responding to an execution instruction aiming at a target task needing to be subjected to identity verification, and acquiring interactive behavior characteristics of a user wearing the virtual reality terminal through preset sensing hardware;
matching the collected interactive behavior characteristics with interactive behavior characteristics preset by a legal user of the virtual reality terminal;
and if the acquired interactive behavior characteristics are matched with the preset interactive behavior characteristics, determining that the identity of the user wearing the virtual reality terminal is legal, and executing the target task.
This application still provides a user authentication's device, is applied to virtual reality terminal, the device includes:
the acquisition module is used for responding to an execution instruction aiming at a target task needing to execute identity verification and acquiring the interactive behavior characteristics of a user wearing the virtual reality terminal through preset sensing hardware;
the matching module is used for matching the acquired interactive behavior characteristics with interactive behavior characteristics preset by a legal user of the virtual reality terminal;
and the verification module is used for determining that the identity of the user wearing the virtual reality terminal is legal and executing the target task if the acquired interactive behavior characteristics are matched with the preset interactive behavior characteristics.
In the method, when a user wearing the virtual reality terminal executes a target task needing identity verification, the virtual reality terminal can acquire interactive behavior characteristics of the user wearing the virtual reality terminal through preset sensing hardware and match the acquired interactive behavior characteristics with interactive behavior characteristics preset by a legal user of the virtual reality terminal; if the collected interactive behavior characteristics are matched with the preset interactive behavior characteristics, the identity of the user wearing the virtual reality terminal is determined to be legal, and the target task is executed, so that the purpose that the user can actively verify the identity validity of the user through executing the preset interactive behavior if the target task needing identity verification is required to be executed in the process of wearing the virtual reality terminal to perform immersion experience is achieved, and the privacy and the safety of the user when the user uses the virtual reality terminal can be further guaranteed.
Drawings
Fig. 1 is a flow chart illustrating a method of user authentication according to an embodiment of the present application;
fig. 2 is a logic block diagram of an apparatus for user authentication according to an embodiment of the present application;
fig. 3 is a hardware structure diagram related to a virtual reality terminal carrying the apparatus for user identity authentication according to an embodiment of the present application.
Detailed Description
The application aims to provide a technical scheme that when a user wearing a VR terminal executes a target task needing identity verification, the legality of the identity of the user can be actively verified by executing a preset interaction behavior, and then privacy and safety of the user when the user uses a virtual reality terminal can be guaranteed.
When a user executes a target task needing identity verification, a VR terminal can acquire interactive behavior characteristics of the user through preset sensing hardware, and the acquired interactive behavior characteristics are matched with interactive behavior characteristics preset by a legal user of the VR terminal; if the collected interactive behavior characteristics are matched with the preset interactive behavior characteristics, the identity of the user wearing the VR terminal is determined to be legal, and the target task is executed, so that the purpose that the user can actively verify the identity validity of the user by executing the preset interactive behavior if the target task needing identity verification is required to be executed in the process of wearing the VR terminal to perform immersion experience is achieved, and the privacy and the safety of the user when the user uses the VR terminal can be further guaranteed.
The present application is described below with reference to specific embodiments and specific application scenarios.
Referring to fig. 1, fig. 1 is a flowchart illustrating a service implementation method based on a virtual reality scene according to an embodiment of the present application, applied to a VR terminal, that performs the following steps:
step 101, in response to an execution instruction for a target task needing to be subjected to identity verification, acquiring interactive behavior characteristics of a user wearing the virtual reality terminal through preset sensing hardware;
102, matching the collected interactive behavior characteristics with interactive behavior characteristics preset by a legal user of the virtual reality terminal;
and 103, if the acquired interactive behavior characteristics are matched with the preset interactive behavior characteristics, determining that the identity of the user wearing the virtual reality terminal is legal, and executing the target task.
The VR terminal is terminal equipment which is developed based on VR technology and can provide three-dimensional immersion experience for users; for example, the VR may be a head-mounted helmet, glasses, or other form of VR terminal device.
In practical applications, the VR terminal may output a VR scene model developed by a developer to a wearer based on a Virtual Reality Operation System (VROS), so that the wearer can obtain a three-dimensional immersion experience in the output VR scene.
The target task generally refers to a task which can be completed in a VR scene presented by a VR terminal facing a user and needs to verify the identity of the user when the user wears the VR terminal to perform immersion experience;
for example, in practical applications, the target task may include an unlocking task for the VR terminal; the verification task for the quick payment is completed by the user in the VR scene; the authentication task for account login is completed by a user in a VR scene; or other target tasks that can be completed in a VR scenario and require authentication of the user's identity.
The sensing hardware may specifically include an infrared sensor, an image sensor, a laser sensor, a radar sensor, and the like, and is not particularly limited in this example;
the interactive behavior features generally refer to behavior features corresponding to all interactive behaviors executed in a VR scene when a user wears the VR terminal for immersion experience;
for example, in practical applications, the interactive behavior feature may include a head gesture of the user, a three-dimensional gesture, or a displacement trajectory generated by the user controlling the movement of the visual focus in the VR scene through the head gesture, the three-dimensional gesture, or an external device (such as an external joystick, a joystick, or the like).
In this example, in order to ensure privacy and security of a user when using the VR terminal, a legitimate user of the VR terminal may interact with an operating system of the VR terminal, and an interaction behavior feature for performing identity authentication on the identity of the legitimate user is preset in the operating system of the VR terminal. When the user uses the VR terminal, the validity of the identity of the user can be actively verified by executing the preset interactive behavior characteristics in the VR scene.
In this case, the technical solutions shown in the above steps 101 to 103 may be an authentication logic in an operating system of the VR terminal, and after the user wears the VR terminal to trigger execution of the target task, the operating system of the VR terminal may respond to an execution instruction sent by the user after triggering the target task, and by executing the authentication logic, the interactive behavior feature of the user wearing the VR terminal is collected based on preset sensing hardware, and then the collected interactive behavior feature is matched with a preset interactive behavior feature of a legal user of the VR terminal, so as to perform legal verification on the identity of the wearer, and further, based on an authentication result, it may be determined whether the target task can be normally executed.
In an embodiment shown, if the collected interactive behavior feature matches the preset interactive behavior feature, at this time, an operating system (hereinafter referred to as an operating system) of the VR terminal may determine that the identity of the user wearing the VR terminal is legal, and execute the target task.
If the collected interactive behavior characteristics are not matched with the preset interactive behavior characteristics, the operating system does not respond to the execution instruction, and the number of times of authentication for the user is counted; when the number of times of authentication for the user wearing the VR terminal reaches a preset number of times, further security authentication can be performed for the user, and after the security authentication passes, the target task is performed after the user wearing the VR terminal is determined to be legal.
In this example, after determining that the identity of the user wearing the VR terminal is legal, the operating system usually opens the execution permission of the target task to the user completely; in this case, if a valid user of the VR terminal does not wear the VR terminal any more, and other users who do not pass authentication wear the VR terminal again, the VR terminal may be exposed to a certain risk of use.
In an embodiment shown, a feature recognition model capable of representing habit interactive behavior features of a legal user can be trained through a preset deep learning algorithm based on a plurality of interactive behavior feature samples of the legal user of the VR terminal collected in advance;
for example, when wearing a VR for an immersion experience, a legitimate user is accustomed to a head gesture, a three-dimensional gesture, a movement trajectory of an operation focus, and the like in a VR scene.
In this example, the operating system may be loaded with the trained feature recognition model in advance. After the user wearing the VR terminal passes the identity authentication, the operating system can still continue to acquire the interactive behavior characteristics of the user wearing the VR terminal through the sensing hardware, and input the acquired interactive behavior characteristics into the characteristic identification model for characteristic identification so as to determine whether the acquired interactive behavior characteristics are matched with the habitual interactive behavior characteristics of the legal user of the virtual reality terminal.
If the collected interactive behavior characteristics are determined to be not matched with the habit interactive behavior characteristics of the legal user of the VR terminal after the model is identified, the detected interactive behavior characteristics are likely to be the interactive behavior generated when the legal user leaves the VR terminal after unlocking the VR terminal and another illegal user wears the VR terminal. In this case, the operating system may restart the flow of performing further security authentication for the user wearing the VR terminal.
Through this kind of mode, can be based on legal user's habit interactive behavior characteristic, after the user identity who wears this VR terminal is legal in the affirmation, under the current condition of wearing person "do not know" at the background, continue to carry out safety protection to this VR terminal to can promote the safety in utilization level at VR terminal.
The technical solution in the present application is described in detail below by taking the above target task as an example of an unlocking task for a VR terminal.
Of course, it should be noted that the target task is an unlocking task for the VR terminal, which is only exemplary and not limiting. In practical applications, the target task may also be a verification task based on quick payment in a VR scenario; and the verification task of account login based on the VR scene, and the like.
The technical scheme of the application is described in detail through three stages of VR scene model creation, VR terminal unlocking and safety protection after VR terminal unlocking.
1) VR scene model creation
In this example, a developer may complete the creation of the VR scene model through a specific modeling tool. The modeling tool is not particularly limited in this example; for example, a developer may complete the creation of a VR scene model using more sophisticated modeling tools such as Unity, 3dsMax, Photoshop, and the like.
In the process of creating a VR scene model through a modeling tool, developers can both obtain the VR scene model and a texture map of the VR scene from a real scene in real life; for example, a texture map and a plane model of a real scene may be acquired by shooting in advance, then textures are processed and a three-dimensional model of the real scene is constructed by using a modeling tool such as Photoshop or 3dmax, then the three-dimensional model is imported to a unity3D platform (U3D for short), picture rendering is performed in the U3D platform through multiple dimensions such as sound effects, graphical interfaces, plug-ins, and lights, then interactive codes are written, and finally modeling of a VR scene model is completed.
In this example, besides the need to create a VR scene model, a developer may also create a 2D or 3D screen locking interface for the operating system of the VR terminal through the modeling tool.
The screen locking interface can be used as an initial interface for trying to perform an operating system of the VR terminal after the VR terminal is started by a user; or, a front page before outputting the VR scene model created by the developer.
When the user finishes the legality aiming at the identity of the user by executing the preset interactive behavior characteristics under the prompt of the screen locking interface, the operating system of the VR terminal can open the access right of entering the operating system at the moment, and then the VR scene model created by the developer is output, so that the wearer can obtain immersion experience in the output VR scene model.
The specific form of the lock screen interface is not particularly limited in this example; in practical application, personalized customization can be performed based on user experience.
2) Unlocking of VR terminal
In this example, after the wearer starts the VR terminal, the VR terminal may output the screen locking interface through the operating system.
In this example, a plurality of virtual elements (e.g., virtual buttons) for triggering unlocking may be provided in the lock screen interface in advance. The user can select the virtual element through some simple interactive operations, and then an unlocking process for the VR terminal is triggered.
For example, in one implementation shown, a virtual button for triggering unlocking may be provided in the lock screen interface, and the wearer may control the movement of the operation focus (also referred to as a visual focus) through a head gesture, a three-dimensional gesture, or an external device, position the operation focus on the virtual button, and then perform some simple interactive operations (e.g., a simple sliding of the operation focus on the virtual button) to trigger an unlocking procedure for the VR terminal.
Of course, in addition to the virtual button for triggering unlocking provided in the screen locking interface, in practical applications, an entity button for triggering unlocking may be provided on an external device of the VR terminal, for example, an operation lever or an operation handle external to the VR terminal, so that when the VR terminal needs to be unlocked, the entity button may be pressed to trigger an unlocking process for the VR terminal.
In this example, after the unlocking process for the VR is triggered, the VR terminal may report an unlocking instruction to the operating system, for example, the unlocking instruction may specifically be an unlocking signal, and after receiving the unlocking instruction, the operating system of the VR terminal may respond to the unlocking instruction and execute the authentication logic shown in steps 101 to 103 to start the unlocking process for the VR terminal.
In this example, after the operating system of the VR terminal starts the unlocking process:
on one hand, at this time, the wearer of the VR terminal can actively verify the validity of the identity of the wearer by executing the preset interactive behavior feature.
On the other hand, the operating system of the VR terminal can acquire the interactive behavior characteristics of the wearer through preset sensing hardware, and match the interactive behavior characteristics with the interactive behavior characteristics for unlocking preset in the operating system by a legal user of the VR terminal, so as to verify whether the identity of the current wearer of the VR terminal is legal.
In this example, the interactive behavior feature may include a head pose of the user, a three-dimensional gesture, or a displacement trajectory generated by the user controlling movement of a visual focus in the VR scene through the head pose, the three-dimensional gesture, or an external device.
That is, for a legitimate user of the VR terminal, in order to improve the usage security level of the VR terminal, the VR terminal may interact with an operating system of the VR terminal (for example, interact with a setting interface of the operating system), and preset a user-defined head posture, a user-defined three-dimensional gesture, or a user-defined special displacement trajectory of the operation focus.
In one embodiment shown, the above-mentioned interactive behavior characteristic is assumed to be a customized head gesture preset by the user (such as nodding, shaking, or other customized head gestures).
Under the condition, after a wearer of the VR terminal triggers an unlocking process, the operating system of the VR terminal can call gravity sensing hardware carried in the VR terminal, perform displacement tracking on the head of the user, and transmit collected head displacement data back to the operating system.
After receiving data returned by the gravity sensing hardware, the operating system can calculate the received head displacement data through an AR engine in the operating system, calculate parameters such as offset and rotation amount of the head of the user relative to an X/Y/Z axis of a VR scene, perform data modeling based on the parameters, and restore the head posture of the user; then matching the restored head gesture with a head gesture for unlocking, which is pre-configured by a legal user of the VR terminal; if the matching is successful, the user identity of the current wearer can be determined to be legal, at this time, the operating system can unlock the VR terminal, the access right of the operating system is opened, and the screen locking interface is closed.
In another embodiment, the interactive behavior feature is assumed to be a customized three-dimensional gesture preset by the user (such as a grip, a rotation in a specific direction, or other customized three-dimensional gestures)
Under the condition, after a wearer of the VR terminal triggers an unlocking process, the operating system of the VR terminal can call sensing hardware carried in the VR terminal, perform displacement tracking on the hand of the user, and transmit collected hand displacement data back to the operating system.
After receiving the data returned by the sensing hardware, the operating system can calculate the received hand displacement data through an AR engine in the operating system, calculate parameters such as offset and rotation amount of the hand of the user relative to an X/Y/Z axis of a VR scene, perform data modeling based on the parameters, and restore the three-dimensional gesture of the user; then matching the restored three-dimensional gesture with a three-dimensional gesture for unlocking, which is pre-configured by a legal user of the VR terminal; if the matching is successful, the user identity of the current wearer can be determined to be legal, at this time, the operating system can unlock the VR terminal, the access right of the operating system is opened, and the screen locking interface is closed.
It should be noted that the sensing hardware called by the operating system when recognizing the three-dimensional gesture of the user depends on the implementation scheme adopted when recognizing the three-dimensional gesture.
For example, in a conventional implementation of VR technology, when recognizing a three-dimensional gesture of a user, it may be generally implemented by a scheme such as a TOF (Time of Flight) scheme, a two-camera binocular imaging scheme, a structured light scheme, and a micro radar scheme. When the three-dimensional gesture of the user is recognized based on a dual-camera binocular imaging scheme, the sensing hardware can be an image sensor; when identifying a three-dimensional gesture of a user based on a TOF scheme, the sensing hardware may then be an infrared sensor. When recognizing a three-dimensional gesture of a user based on a structured light scheme, the sensing hardware may be a laser sensor. When recognizing a three-dimensional gesture of a user based on a knot-mini radar scheme, the sensing hardware may be a radar sensor, or the like.
In another embodiment shown, the above-mentioned interactive behavior characteristic is assumed to be a moving track of an operation focus preset by a user.
In this case, the wearer can control the operation focus to move on the lock screen interface by head posture, three-dimensional gesture, or by operating an external device such as a joystick or an operation handle, so as to generate a movement track.
After a wearer of the VR terminal triggers an unlocking process, an operating system of the VR terminal can call gravity sensing hardware (such as gravity sensing hardware carried in a VR helmet, a user hand or external equipment) carried in the VR terminal, perform displacement tracking on the head, the gesture and the external equipment of the user, synchronously control the displacement of an operation focus in a VR scene based on the head, the gesture and the displacement of the external equipment of the user, and then calculate a moving track from the operation focus to the VR scene.
In order to enable the user to visually check the generated movement track, the operating system may highlight (for example, highlight) the calculated operation track in the screen locking interface.
After the operating system calculates the moving track of the operating focus in the VR scene, the moving track can be matched with a moving track for unlocking, which is pre-configured by a legal user of the VR terminal; if the matching is successful, the user identity of the current wearer can be determined to be legal, at this time, the operating system can unlock the VR terminal, the access right of the operating system is opened, and the screen locking interface is closed.
It should be noted that, in this example, when the user matches the acquired interactive behavior feature with the user behavior feature preset by the legitimate user, in order to avoid the problem that the legitimate user cannot unlock the VR terminal due to the user presetting a particularly complex user behavior feature, in the matching process, it may not be necessary to adopt accurate matching (i.e., the interactive behavior feature is completely matched), but fuzzy matching is adopted, that is, as long as the similarity between the acquired user behavior feature and the user behavior feature preset by the legitimate user reaches a preset threshold, it may be considered that the two are matched.
In this example, when the operating system finally determines that the interactive behavior feature executed by the wearer does not match the interactive behavior feature preset by the legitimate user for unlocking through the unlocking verification process shown above, the operating system may not respond at this time, and may start a counter in the background at the same time to count the number of times of unlocking the wearer (i.e., the number of times of authentication for the user).
When the unlocking times of the wearer reach the preset times, the unlocking is still not successful, and at this time, the operating system may start a security authentication procedure for the wearer, and perform further security authentication for the wearer.
In this example, when further security authentication is performed for the wearer, this may be done in particular in the manner shown below.
In one embodiment shown, the biometric feature (such as a fingerprint) of the wearer may be collected by biometric identification hardware carried by the VR terminal to further secure the user.
Under the condition, when the retry number of unlocking of the wearer reaches a preset threshold value, the operating system can output a prompt message for prompting the user to acquire biological characteristics for safety authentication on a screen locking interface; for example, when the biometric feature is a fingerprint, the prompt message may be a text message "please input fingerprint information to complete unlocking authentication".
At this time, the operating system can acquire the biological characteristics of the wearer through the biological identification hardware, and match the acquired biological characteristics with the biological characteristics reserved by the legal user of the VR terminal; if the collected biological characteristics are matched with the biological characteristics reserved by the legal user of the VR terminal, the safety certification of the current wearer of the VR terminal can be determined to pass, and the VR terminal is unlocked.
In one embodiment shown, further security authentication may also be performed by a user-entered authentication password.
The identity authentication password may be a security authentication password preset by a legal user, or a password dynamically issued by an operating system to the legal user.
Under the condition, when the retry number of unlocking of the wearer reaches a preset threshold value, the operating system can display an input box on the screen locking interface and output a prompt prompting the user to input an identity verification password to complete security authentication; for example, the prompt message may be a text message "please input an authentication password to complete unlocking authentication".
When the wearer inputs an authentication password in the screen locking interface, the operating system matches the authentication password with an authentication password reserved by a legal user or an authentication password issued by the operating system; if the two are matched, the safety certification of the current wearer of the VR terminal can be determined to pass, and the VR terminal is unlocked.
3) Safety protection after VR terminal unblock
In this example, after the VR terminal is successfully unlocked, since the VR terminal is successfully unlocked, the access right of the operating system will be completely opened, in this case, when a valid user of the VR terminal does not wear the VR terminal any more, if the VR terminal still maintains an unlocked state, the VR terminal may still face a certain risk of use.
In an embodiment shown, a feature recognition model capable of representing habit interactive behavior features of a legal user can be trained through a preset deep learning algorithm based on a plurality of interactive behavior feature samples of the legal user of the VR terminal collected in advance; for example, when wearing a VR for an immersion experience, a legitimate user is accustomed to a head gesture, a three-dimensional gesture, a movement trajectory of an operation focus, and the like in a VR scene.
The deep learning algorithm is not particularly limited in this example, and a mature deep learning algorithm such as a neural network and a regression algorithm may be used in practical applications. When the feature recognition model is trained, the training can be completed on the VR terminal (for example, the VR terminal can independently carry a deep learning algorithm), or can be completed on a host machine collocated with the VR terminal, or can be completed on a server in the cloud, which is not particularly limited in this example.
The operating system of the VR terminal may be loaded with the trained feature recognition model in advance. After the VR terminal is successfully unlocked, the operating system can still continuously acquire the interactive behavior characteristics of the user wearing the VR terminal through sensing hardware, and performs characteristic identification on the acquired interactive behavior characteristic input value in the characteristic identification model so as to determine whether the acquired interactive behavior characteristics are matched with the habit interactive behavior characteristics of the legal user of the virtual reality terminal.
If the collected interactive behavior characteristics are determined to be not matched with the habit interactive behavior characteristics of the legal user of the VR terminal after the model is identified, the detected interactive behavior characteristics are likely to be the interactive behavior generated when the legal user leaves the VR terminal after unlocking the VR terminal and another illegal user wears the VR terminal.
In this case, the operating system may re-lock the VR terminal, and restart the process of performing further security authentication for the user wearing the VR terminal, and the specific security authentication process is not described again.
Therefore, by the mode, based on habit interaction behavior characteristics of a legal user, after the VR terminal is successfully unlocked, safety protection is continuously performed on the VR terminal under the condition that a current wearer is 'unaware' at the background, so that the use safety level of the VR terminal can be improved.
Of course, in practical applications, besides the above-described deep learning model that can represent the habit interactive behavior characteristics of the legitimate user by training, the safety protection after successful unlocking can be performed on the VR terminal, and the safety protection after successful unlocking can also be continuously performed on the VR terminal by other means.
For example, in practical applications, a conventional unlocking timeout mechanism may be introduced, that is, after the VR terminal is successfully unlocked, if the operating system of the VR terminal does not detect any form of interactive operation within a preset time period, the locking state may be automatically performed, which is not listed in this example.
The technical solution in the present application is described in detail by taking the above target task as an example of an unlocking task for a VR terminal.
It should be noted that, in this example, the authentication logic shown in steps 101 to 103 may also be applied to other application scenarios besides the application scenario of unlocking the VR terminal.
For example, when the method is applied to a quick payment scene in a VR scene, the target task may be a verification task based on quick payment in the VR scene; in this case, the operating system may verify the payment identity of the user when the user performs quick payment in the VR scenario by executing the authentication logic shown in steps 101 to 103, and complete payment after the authentication is passed.
After the identity of the user passes the verification, the operating system may further continue to recognize whether the interactive behavior feature of the user wearing the VR terminal is the habit interactive behavior feature of the legal user through the trained interactive behavior feature recognition model, and when it is recognized that the interactive behavior feature of the user currently wearing the VR terminal is not the habit interactive behavior feature of the legal user, perform further security authentication on the identity of the user currently wearing the VR terminal, re-authenticate the payment identity of the user, and the specific implementation process is not described in detail, and those skilled in the art may also perform equivalent implementation by referring to the implementation process in the unlocking scenario shown above.
For another example, when the method is applied to an account login scene in a VR scene, the target task may be a verification task based on account login in the VR scene; in this case, the operating system may perform the authentication logic shown in steps 101 to 103, when the user logs in an account in a VR scenario, authenticate the login identity of the user, and interact with the corresponding login server after the authentication is passed to complete the login.
After the identity of the user passes the verification, the operating system may further continue to recognize whether the interactive behavior feature of the user wearing the VR terminal is the habit interactive behavior feature of the legal user through the trained interactive behavior feature recognition model, and when it is recognized that the interactive behavior feature of the user currently wearing the VR terminal is not the habit interactive behavior feature of the legal user, perform further security authentication on the identity of the user currently wearing the VR terminal, and re-verify the login identity of the user, and the specific implementation process is not described in detail, and those skilled in the art may also perform equivalent implementation by referring to the implementation process in the unlocking scenario shown above. Of course, besides the two application scenarios shown above, the authentication logic shown in steps 101 to 103 can also be applied to other similar application scenarios that require user authentication, which are not listed in this example.
As can be seen from the description of the above embodiment, in the application, when a user wearing a virtual reality terminal executes a target task that needs to perform identity authentication, the virtual reality terminal may collect interactive behavior characteristics of the user wearing the virtual reality terminal through preset sensing hardware, and match the collected interactive behavior characteristics with interactive behavior characteristics preset by a valid user of the virtual reality terminal; if the collected interactive behavior characteristics are matched with the preset interactive behavior characteristics, the identity of the user wearing the virtual reality terminal is determined to be legal, and the target task is executed, so that the purpose that the user can actively verify the identity validity of the user through executing the preset interactive behavior if the target task needing identity verification is required to be executed in the process of wearing the virtual reality terminal to perform immersion experience is achieved, and the privacy and the safety of the user when the user uses the virtual reality terminal can be further guaranteed.
Corresponding to the method embodiment, the application also provides an embodiment of the device.
Referring to fig. 2, the present application provides a device 20 for user authentication, which is applied to a VR terminal; referring to fig. 3, a hardware architecture related to a VR terminal as the device 20 for carrying the user authentication generally includes a CPU, a memory, a non-volatile memory, a network interface, an internal bus, and the like; in software implementation, the apparatus 20 for user authentication can be generally understood as a computer program loaded in a memory, and a logic apparatus formed by combining software and hardware after being executed by a CPU, where the apparatus 20 includes:
the acquisition module 201 is used for responding to an execution instruction aiming at a target task needing to be subjected to identity authentication and acquiring the interactive behavior characteristics of a user wearing the virtual reality terminal through preset sensing hardware;
the matching module 202 is used for matching the acquired interactive behavior characteristics with interactive behavior characteristics preset by a legal user of the virtual reality terminal;
and the verification module 203 determines that the identity of the user wearing the virtual reality terminal is legal and executes the target task if the acquired interactive behavior characteristics are matched with the preset interactive behavior characteristics.
In this example, the interactive behavior feature includes any one of a head pose of the user, a three-dimensional gesture, and a displacement trajectory generated by controlling the movement of the visual focus by the head pose, the three-dimensional gesture, or an external device.
In this example, the apparatus 20 may further include:
an authentication module 204 (not shown in fig. 2) configured to, if the collected interactive behavior feature does not match the preset interactive behavior feature, perform further security authentication on the user wearing the virtual reality terminal when the number of authentication times for the user reaches a preset number of times;
the verification module 203 further:
and after the safety certification is passed, determining that the user identity wearing the virtual reality terminal is legal, and executing the target task.
In this example, the apparatus 20 may further include:
the identification module 205 (not shown in figure 2),
after the identity of the user wearing the virtual reality terminal is determined to be legal, acquiring interactive behavior characteristics of the user wearing the virtual reality terminal through preset sensing hardware; inputting the collected interactive behavior characteristics into a preset interactive behavior characteristic recognition model for characteristic recognition so as to determine whether the collected interactive behavior characteristics are matched with the habit interactive behavior characteristics of the legal user of the virtual reality terminal; the preset interactive behavior feature recognition model is obtained by training a plurality of interactive behavior feature samples of a legal user of the virtual reality terminal based on a preset deep learning algorithm; the preset interactive behavior feature recognition model represents the habit interactive behavior features of the legal user of the virtual reality terminal;
the authentication module 204 further:
and if the acquired interactive behavior characteristics are not matched with the habit interactive behavior characteristics of the legal user of the virtual reality terminal, performing further safety certification aiming at the user wearing the virtual reality terminal.
In this example, the authentication module 204 specifically:
acquiring the biological characteristics of the user through preset biological identification hardware, matching the acquired biological characteristics with the biological characteristics preset by the legal user of the virtual reality terminal, and determining that the safety certification for the user passes if the acquired biological characteristics are matched with the biological characteristics preset by the legal user of the virtual reality terminal; or,
and acquiring an authentication password input by the user, matching the acquired authentication password with a preset authentication password, and determining that the security authentication for the user passes if the acquired authentication password is matched with the preset authentication password of the legal user of the virtual reality terminal.
In this example, the target task may include an unlocking task for the virtual reality terminal.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.

Claims (8)

1. A method for user identity authentication is applied to a virtual reality terminal, and comprises the following steps:
responding to an execution instruction aiming at a target task needing to be subjected to identity verification, and acquiring interactive behavior characteristics of a user wearing the virtual reality terminal through preset sensing hardware;
matching the collected interactive behavior characteristics with interactive behavior characteristics preset by a legal user of the virtual reality terminal;
if the collected interactive behavior characteristics are matched with the preset interactive behavior characteristics, determining that the identity of the user wearing the virtual reality terminal is legal, and executing the target task;
the target task is a task which is completed in a virtual reality scene presented by the virtual reality terminal facing the user and needs to verify the identity of the user; the interactive behavior feature is a behavior feature corresponding to an interactive behavior executed by the user in the virtual reality scene; the interactive behavior characteristics comprise any one of a head gesture, a three-dimensional gesture and a displacement track generated by controlling the movement of the visual focus through the head gesture, the three-dimensional gesture or external equipment;
further comprising:
when the identity of the user wearing the virtual reality terminal is determined to be legal, acquiring interactive behavior characteristics of the user wearing the virtual reality terminal through preset sensing hardware;
inputting the collected interactive behavior characteristics into a preset interactive behavior characteristic recognition model for characteristic recognition so as to determine whether the collected interactive behavior characteristics are matched with the habit interactive behavior characteristics of the legal user of the virtual reality terminal; the preset interactive behavior feature recognition model is obtained by training a plurality of interactive behavior feature samples of a legal user of the virtual reality terminal based on a preset deep learning algorithm; the preset interactive behavior feature recognition model represents the habit interactive behavior features of the legal user of the virtual reality terminal;
and if the acquired interactive behavior characteristics are not matched with the habit interactive behavior characteristics of the legal user of the virtual reality terminal, performing further safety certification aiming at the user wearing the virtual reality terminal.
2. The method of claim 1, further comprising:
if the collected interactive behavior characteristics are not matched with the preset interactive behavior characteristics, performing further security authentication on the user when the number of times of identity authentication on the user wearing the virtual reality terminal reaches a preset number of times;
and after the safety certification is passed, determining that the user identity wearing the virtual reality terminal is legal, and executing the target task.
3. The method according to claim 1 or 2, wherein the performing further secure authentication for the user comprises:
acquiring the biological characteristics of the user through preset biological identification hardware, matching the acquired biological characteristics with the biological characteristics preset by the legal user of the virtual reality terminal, and determining that the safety certification for the user passes if the acquired biological characteristics are matched with the biological characteristics preset by the legal user of the virtual reality terminal; or,
and acquiring an authentication password input by the user, matching the acquired authentication password with a preset authentication password, and determining that the security authentication for the user passes if the acquired authentication password is matched with the preset authentication password of the legal user of the virtual reality terminal.
4. The method of claim 1, wherein the target task comprises an unlock task for the virtual reality terminal.
5. An apparatus for user identity authentication, applied to a virtual reality terminal, the apparatus comprising:
the acquisition module is used for responding to an execution instruction aiming at a target task needing to execute identity verification and acquiring the interactive behavior characteristics of a user wearing the virtual reality terminal through preset sensing hardware;
the matching module is used for matching the acquired interactive behavior characteristics with interactive behavior characteristics preset by a legal user of the virtual reality terminal;
the verification module is used for determining that the identity of the user wearing the virtual reality terminal is legal and executing the target task if the acquired interactive behavior characteristics are matched with the preset interactive behavior characteristics;
the target task is a task which is completed in a virtual reality scene presented by the virtual reality terminal facing the user and needs to verify the identity of the user; the interactive behavior feature is a behavior feature corresponding to an interactive behavior executed by the user in the virtual reality scene; the interactive behavior characteristics comprise any one of a head gesture, a three-dimensional gesture and a displacement track generated by controlling the movement of the visual focus through the head gesture, the three-dimensional gesture or external equipment;
further comprising:
the identification module is used for acquiring the interactive behavior characteristics of the user wearing the virtual reality terminal through preset sensing hardware after the identity of the user wearing the virtual reality terminal is determined to be legal; inputting the collected interactive behavior characteristics into a preset interactive behavior characteristic recognition model for characteristic recognition so as to determine whether the collected interactive behavior characteristics are matched with the habit interactive behavior characteristics of the legal user of the virtual reality terminal; the preset interactive behavior feature recognition model is obtained by training a plurality of interactive behavior feature samples of a legal user of the virtual reality terminal based on a preset deep learning algorithm; the preset interactive behavior feature recognition model represents the habit interactive behavior features of the legal user of the virtual reality terminal;
the authentication module further:
and if the acquired interactive behavior characteristics are not matched with the habit interactive behavior characteristics of the legal user of the virtual reality terminal, performing further safety certification aiming at the user wearing the virtual reality terminal.
6. The apparatus of claim 5, further comprising:
the authentication module is used for performing further safety authentication on the user when the number of times of identity authentication on the user wearing the virtual reality terminal reaches a preset number of times if the acquired interactive behavior characteristics are not matched with the preset interactive behavior characteristics;
the verification module further:
and after the safety certification is passed, determining that the user identity wearing the virtual reality terminal is legal, and executing the target task.
7. The apparatus according to claim 5 or 6, wherein the authentication module is specifically:
acquiring the biological characteristics of the user through preset biological identification hardware, matching the acquired biological characteristics with the biological characteristics preset by the legal user of the virtual reality terminal, and determining that the safety certification for the user passes if the acquired biological characteristics are matched with the biological characteristics preset by the legal user of the virtual reality terminal; or,
and acquiring an authentication password input by the user, matching the acquired authentication password with a preset authentication password, and determining that the security authentication for the user passes if the acquired authentication password is matched with the preset authentication password of the legal user of the virtual reality terminal.
8. The apparatus of claim 5, wherein the target task comprises an unlock task for the virtual reality terminal.
CN201610895118.4A 2016-10-13 2016-10-13 User identity authentication method and device Active CN107018121B (en)

Priority Applications (11)

Application Number Priority Date Filing Date Title
CN201610895118.4A CN107018121B (en) 2016-10-13 2016-10-13 User identity authentication method and device
TW106126424A TWI668588B (en) 2016-10-13 2017-08-04 Method and device for user identity verification
US15/782,747 US10437973B2 (en) 2016-10-13 2017-10-12 Virtual reality identity verification
JP2019520445A JP6692560B2 (en) 2016-10-13 2017-10-13 Virtual reality identity verification
MYPI2019002056A MY200878A (en) 2016-10-13 2017-10-13 Virtual Reality Identity Verification
SG11201903276VA SG11201903276VA (en) 2016-10-13 2017-10-13 Virtual reality identity verification
PCT/US2017/056616 WO2018071833A1 (en) 2016-10-13 2017-10-13 Virtual reality identity verification
EP17859671.4A EP3526718B1 (en) 2016-10-13 2017-10-13 Virtual reality identity verification
KR1020197013345A KR102151897B1 (en) 2016-10-13 2017-10-13 Virtual Reality Identity Verification
PH12019500807A PH12019500807A1 (en) 2016-10-13 2019-04-12 Virtual reality identity verification
US16/593,758 US10915619B2 (en) 2016-10-13 2019-10-04 Virtual reality identity verification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610895118.4A CN107018121B (en) 2016-10-13 2016-10-13 User identity authentication method and device

Publications (2)

Publication Number Publication Date
CN107018121A CN107018121A (en) 2017-08-04
CN107018121B true CN107018121B (en) 2021-07-20

Family

ID=59438738

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610895118.4A Active CN107018121B (en) 2016-10-13 2016-10-13 User identity authentication method and device

Country Status (10)

Country Link
US (2) US10437973B2 (en)
EP (1) EP3526718B1 (en)
JP (1) JP6692560B2 (en)
KR (1) KR102151897B1 (en)
CN (1) CN107018121B (en)
MY (1) MY200878A (en)
PH (1) PH12019500807A1 (en)
SG (1) SG11201903276VA (en)
TW (1) TWI668588B (en)
WO (1) WO2018071833A1 (en)

Families Citing this family (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107018121B (en) 2016-10-13 2021-07-20 创新先进技术有限公司 User identity authentication method and device
TWI649713B (en) * 2017-09-22 2019-02-01 臺灣行動支付股份有限公司 Cardless withdrawal system using mobile device and operation method thereof
CN109670282B (en) 2017-10-17 2023-12-22 深圳富泰宏精密工业有限公司 Unlocking system, unlocking method and electronic device
TWI661335B (en) * 2017-10-17 2019-06-01 群邁通訊股份有限公司 Unlocking system, unlocking method and electronic device
US10949522B2 (en) * 2017-12-05 2021-03-16 International Business Machines Corporation Authentication of user identity using a virtual reality device
CN108564688A (en) * 2018-03-21 2018-09-21 阿里巴巴集团控股有限公司 The method and device and electronic equipment of authentication
CN108536573B (en) * 2018-04-17 2021-03-26 中山市华南理工大学现代产业技术研究院 A method for monitoring VR application performance and user behavior
CN109726106B (en) * 2018-05-15 2024-01-19 深圳鹏开信息技术有限公司 Method, device, terminal and storage medium for verifying option data
US10768951B2 (en) 2018-08-29 2020-09-08 Bank Of America Corporation Providing augmented reality user interfaces and controlling automated systems based on user activity information and pre-staging information
US10761909B2 (en) * 2018-09-06 2020-09-01 The Toronto-Dominion Bank Devices and methods for providing notifications
US11120496B2 (en) 2018-09-06 2021-09-14 Bank Of America Corporation Providing augmented reality user interfaces and controlling back-office data processing systems based on augmented reality events
EP3853749B1 (en) * 2018-09-18 2024-12-25 Nokia Technologies Oy Apparatus and method for authenticating a user
CN110889715A (en) * 2019-01-10 2020-03-17 广东乐心医疗电子股份有限公司 Gift box unlocking method, gift box, device, electronic equipment and storage medium
CN113228008A (en) * 2019-02-22 2021-08-06 居米奥公司 Efficient removal of personal information from a data set
EP3928229A1 (en) * 2019-02-22 2021-12-29 Jumio Corporation Providing outcome explanation for algorithmic decisions
CN110049490B (en) * 2019-04-23 2022-12-30 广东小天才科技有限公司 Safety protection method and device for wearable equipment, wearable equipment and medium
KR102044008B1 (en) * 2019-05-07 2019-11-12 옥철식 System for identity authentication and management in the virtual reality world
WO2020229684A1 (en) * 2019-05-16 2020-11-19 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Concepts for federated learning, client classification and training data similarity measurement
US11200305B2 (en) * 2019-05-31 2021-12-14 International Business Machines Corporation Variable access based on facial expression configuration
CN110674520B (en) * 2019-09-26 2023-12-01 杨雪川 User information acquisition interaction system and method
CN110807180A (en) * 2019-10-28 2020-02-18 支付宝(杭州)信息技术有限公司 Method and device for safety certification and training safety certification model and electronic equipment
CN110929051B (en) * 2019-11-07 2023-05-16 深圳恩维传媒有限公司 Integrated system and method for controlling music, vision and lamplight through image recognition
CN110826047A (en) * 2019-11-11 2020-02-21 中国工商银行股份有限公司 User verification method and device based on behavior characteristics
CN111143910B (en) * 2019-12-25 2022-03-25 惠州Tcl移动通信有限公司 Anti-theft detection method and device, storage medium and terminal
CN111127029A (en) * 2019-12-27 2020-05-08 上海诺亚投资管理有限公司 A payment method and system based on VR video
US11500977B2 (en) * 2020-01-07 2022-11-15 Fmr Llc User authentication in a three-dimensional (3D) alternative reality software application
US12248544B2 (en) * 2020-02-20 2025-03-11 Hewlett-Packard Development Company, L.P. User authentication based on biometric data
CN111552937A (en) * 2020-04-28 2020-08-18 深圳壹账通智能科技有限公司 User identity authentication method, device, medium and electronic equipment
FR3111503A1 (en) 2020-06-23 2021-12-17 Orange Device and method for authenticating a user of a first electronic device connected to a second electronic device
CN111931151A (en) * 2020-08-24 2020-11-13 Oppo广东移动通信有限公司 Equipment control method and device, storage medium and wearable equipment
CN112199657B (en) * 2020-09-21 2023-01-24 暨南大学 Identity authentication method and VR device based on virtual reality environment
CN112527934B (en) * 2020-12-09 2024-08-16 深圳市天彦通信股份有限公司 Visitor trip analysis method and device, electronic equipment and storage medium
CN112579232B (en) * 2020-12-09 2022-05-10 珠海格力电器股份有限公司 Content display method and device, electronic equipment and computer storage medium
US20220197989A1 (en) * 2020-12-21 2022-06-23 International Business Machines Corporation Gamification-based multi-factor authentication
CN112612735B (en) * 2020-12-30 2022-10-18 湖南翰坤实业有限公司 Unity-based multi-platform polymorphic VR hardware interface management method and system
GB2609009B (en) * 2021-07-16 2024-01-03 Sony Interactive Entertainment Inc Head-mountable display systems and methods
CN114415824B (en) * 2021-12-13 2024-08-09 珠海格力电器股份有限公司 Intelligent bracelet control method and device, computer equipment and storage medium
GB2628281A (en) * 2022-01-07 2024-09-18 Jumio Corp Biometric authentication using head-mounted devices
US12327315B2 (en) * 2022-10-25 2025-06-10 Bank Of America Corporation System and method for auto-generating and sharing customized virtual environments
CN117631826A (en) * 2023-11-01 2024-03-01 珠海莫界科技有限公司 Unlocking method and device and intelligent wearable equipment
CN117421717B (en) * 2023-12-18 2024-04-09 深圳竹云科技股份有限公司 Account authorization method, account authorization device, computer equipment and storage medium
CN118296581B (en) * 2024-06-06 2024-12-13 暨南大学 VR limb interaction-based continuous identity authentication method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102467657A (en) * 2010-11-16 2012-05-23 三星电子株式会社 Gesture recognition system and method
CN103442114A (en) * 2013-08-16 2013-12-11 中南大学 Identity authentication method based on dynamic gesture
CN104683104A (en) * 2013-12-03 2015-06-03 腾讯科技(深圳)有限公司 Identity identification method, identity identification device and identity identification system
CN104967887A (en) * 2015-06-06 2015-10-07 深圳市虚拟现实科技有限公司 NFC-based information interaction method and virtual reality glasses
CN105915418A (en) * 2016-05-23 2016-08-31 珠海格力电器股份有限公司 Household appliance control method and device

Family Cites Families (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7725732B1 (en) * 2003-12-16 2010-05-25 Ballard Claudio R Object authentication system
US8281392B2 (en) * 2006-08-11 2012-10-02 Airdefense, Inc. Methods and systems for wired equivalent privacy and Wi-Fi protected access protection
US8726355B2 (en) 2008-06-24 2014-05-13 Gary Stephen Shuster Identity verification via selection of sensible output from recorded digital data
KR20100002756A (en) * 2008-06-30 2010-01-07 삼성전자주식회사 Matrix blogging system and service support method thereof
US8326853B2 (en) 2009-01-20 2012-12-04 International Business Machines Corporation Virtual world identity management
KR101615719B1 (en) * 2009-09-18 2016-04-27 삼성전자주식회사 Apparatus and method for extracting user's third dimension facial expression
US20150310497A1 (en) * 2009-12-17 2015-10-29 David Valin Method and process for registration, creation and management of micro shares of real or intangible properties and advertisements in a network system
US20110153362A1 (en) * 2009-12-17 2011-06-23 Valin David A Method and mechanism for identifying protecting, requesting, assisting and managing information
US9489040B2 (en) * 2010-07-19 2016-11-08 Smart Technologies Ulc Interactive input system having a 3D input space
US10476873B2 (en) 2010-11-29 2019-11-12 Biocatch Ltd. Device, system, and method of password-less user authentication and password-less detection of user identity
KR101202450B1 (en) * 2010-12-08 2012-11-16 와플스토어 주식회사 Cost-per-mission system using location based service and Cost-per-mission method using the same
KR101411304B1 (en) * 2011-05-12 2014-06-24 한양대학교 에리카산학협력단 Method and System for Providing Virtual Agent Synchronized Characteristic of Target Living Thing
JP2013020304A (en) * 2011-07-07 2013-01-31 Ntt Docomo Inc Mobile information terminal, action feature learning method, action feature authentication method, and program
US20140298672A1 (en) 2012-09-27 2014-10-09 Analog Devices Technology Locking and unlocking of contacless gesture-based user interface of device having contactless gesture detection system
US20140096036A1 (en) * 2012-09-28 2014-04-03 Avaya Inc. Transporting avatars and meeting materials into virtual reality meeting rooms
US9092600B2 (en) * 2012-11-05 2015-07-28 Microsoft Technology Licensing, Llc User authentication on augmented reality display device
US20140282874A1 (en) 2013-03-12 2014-09-18 Boston Light LLC System and method of identity verification in a virtual environment
EP3019991B1 (en) * 2013-07-09 2019-02-20 BioCatch Ltd. Device, system, and method of differentiating among users of a computerized service
US9286717B2 (en) * 2013-07-30 2016-03-15 Hewlett-Packard Development Company, L.P. 3D modeling motion parameters
US9402018B2 (en) * 2013-12-17 2016-07-26 Amazon Technologies, Inc. Distributing processing for imaging processing
CN103761460B (en) * 2013-12-18 2017-01-18 微软技术许可有限责任公司 Method for authenticating users of display equipment
US10142378B2 (en) * 2014-01-30 2018-11-27 Symantec Corporation Virtual identity of a user based on disparate identity services
US9223951B2 (en) * 2014-02-07 2015-12-29 Bank Of America Corporation User authentication based on other applications
EP3113682A4 (en) * 2014-03-06 2017-03-29 Virtual Reality Medical Applications, Inc. Virtual reality medical application system
US20150262052A1 (en) * 2014-03-14 2015-09-17 Ebay Inc. Omni smart card
AU2015255652B2 (en) * 2014-05-09 2018-03-29 Google Llc Systems and methods for using eye signals with secure mobile communications
US9811650B2 (en) * 2014-12-31 2017-11-07 Hand Held Products, Inc. User authentication system and method
CN105827406A (en) * 2015-01-05 2016-08-03 腾讯科技(深圳)有限公司 Identity verification method, identity verification device, and identity verification system
US10111093B2 (en) 2015-01-09 2018-10-23 Qualcomm Incorporated Mobile device to provide continuous and discrete user authentication
WO2016133540A1 (en) * 2015-02-20 2016-08-25 Hewlett-Packard Development Company, L.P. Eye gaze authentication
EP3262488B1 (en) 2015-02-25 2021-04-07 BAE Systems PLC Apparatus and method for effecting a control action in respect of system functions
KR20160118508A (en) 2015-04-02 2016-10-12 삼성에스디에스 주식회사 Apparatus and method for user authentication
KR101744042B1 (en) * 2016-01-14 2017-06-07 주식회사 골프존뉴딘 Apparatus for base-ball practice, sensing device and sensing method used to the same and control method for the same
KR101865576B1 (en) * 2016-01-22 2018-06-08 주식회사 골프존뉴딘홀딩스 Apparatus for base-ball practice, sensing device and sensing method used to the same and control method for the same
US9965675B2 (en) * 2016-09-15 2018-05-08 Georgios P. Schinas Using virtual reality for behavioral analysis
CN107018121B (en) 2016-10-13 2021-07-20 创新先进技术有限公司 User identity authentication method and device
TW201901355A (en) * 2017-05-12 2019-01-01 宏碁股份有限公司 Virtual reality system having automatic discovering and connecting function and controlling method thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102467657A (en) * 2010-11-16 2012-05-23 三星电子株式会社 Gesture recognition system and method
CN103442114A (en) * 2013-08-16 2013-12-11 中南大学 Identity authentication method based on dynamic gesture
CN104683104A (en) * 2013-12-03 2015-06-03 腾讯科技(深圳)有限公司 Identity identification method, identity identification device and identity identification system
CN104967887A (en) * 2015-06-06 2015-10-07 深圳市虚拟现实科技有限公司 NFC-based information interaction method and virtual reality glasses
CN105915418A (en) * 2016-05-23 2016-08-31 珠海格力电器股份有限公司 Household appliance control method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
GlassGesture: Exploring Head Gesture Interface of Smart Glasses;Shanhe Yi et al;《IEEE Infocom 2016 Poster Presentation》;20160908;全文 *
基于手机加速度传感器的静态手势身份认证方法;沈爱敏等;《传感器与微系统》;20150620(第06期);全文 *

Also Published As

Publication number Publication date
US10437973B2 (en) 2019-10-08
WO2018071833A1 (en) 2018-04-19
PH12019500807A1 (en) 2020-01-20
TW201814568A (en) 2018-04-16
KR102151897B1 (en) 2020-09-03
US20200110865A1 (en) 2020-04-09
TWI668588B (en) 2019-08-11
SG11201903276VA (en) 2019-05-30
CN107018121A (en) 2017-08-04
US10915619B2 (en) 2021-02-09
EP3526718B1 (en) 2021-03-03
EP3526718A4 (en) 2019-08-21
JP6692560B2 (en) 2020-05-13
JP2019537119A (en) 2019-12-19
US20180107816A1 (en) 2018-04-19
KR20190061067A (en) 2019-06-04
MY200878A (en) 2024-01-21
EP3526718A1 (en) 2019-08-21

Similar Documents

Publication Publication Date Title
CN107018121B (en) User identity authentication method and device
TWI683236B (en) Business implementation method and device based on virtual reality scene
CN107038361B (en) Service realization method and device based on virtual reality scene
EP3528156B1 (en) Virtual reality environment-based identity authentication method and apparatus
US11170087B2 (en) Virtual reality scene-based business verification method and device
CN107066079A (en) Service implementation method and device based on virtual reality scenario
CN108958573B (en) Identity authentication method and device based on virtual reality scene
CN106921655B (en) Service authorization method and device
CN117456619A (en) Palm image recognition method, device, equipment, storage medium and program product
HK1241157A (en) User authentication method and device
HK1241157A1 (en) User authentication method and device
CN107015854B (en) Control method and device of biological characteristic acquisition hardware
HK1241157B (en) User authentication method and device
HK40001235A (en) Identity authentication method and identity authentication device based on virtual reality (vr) scene
HK1241059A1 (en) Vr scene-based business realization method and device
HK1241059A (en) Vr scene-based business realization method and device
HK40001235B (en) Identity authentication method and identity authentication device based on virtual reality (vr) scene
HK1241493A1 (en) Vr scene-based business realization method and device
HK1241493A (en) Vr scene-based business realization method and device
HK1243511A1 (en) Vr environment-based identity authentication method and apparatus
HK1241493B (en) Vr scene-based business realization method and device
HK1239914A1 (en) Service authentication method and device based on vr scenario

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1241157

Country of ref document: HK

TA01 Transfer of patent application right

Effective date of registration: 20191211

Address after: P.O. Box 31119, grand exhibition hall, hibiscus street, 802 West Bay Road, Grand Cayman, Cayman Islands

Applicant after: Innovative advanced technology Co., Ltd

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Co., Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant